Affected configuration(s):
cpe:/a:catfish_project:catfish:0.6.0
cpe:/a:catfish_project:catfish:0.6.1
cpe:/a:catfish_project:catfish:0.6.2
cpe:/a:catfish_project:catfish:0.6.3
cpe:/a:catfish_project:catfish:0.6.4
cpe:/a:catfish_project:catfish:0.8.0
cpe:/a:catfish_project:catfish:0.8.1
cpe:/a:catfish_project:catfish:0.8.2
cpe:/a:catfish_project:catfish:1.0.0
Date published: 2014-02-26T09:55:08.583-05:00
Date last modified: 2014-03-11T12:56:27.457-04:00
CVSS Score: 4.6
Principal attack vector: LOCAL
Complexity: LOW
Reference URL: http://openwall.com/lists/oss-security/2014/02/25/2
Summary: Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.